Flag guard canned_fs_config_sys_nice

Guard using canned_fs_config_sys_nice behind
RELEASE_AVF_ENABLE_VIRT_CPUFREQ flag, which allows for elevated SYS_NICE
permissions when running crosvm.

Test: m, tested with flag on/off and checked caps were applied
correctly.
Bug: 322197421
Change-Id: I35f87d23445d1c2583bd3888a6ff242b1c55992d
Signed-off-by: David Dai <davidai@google.com>
2 files changed
tree: 9df71fb5b5ce9f7e626d0342316ff5b5a973ffb6
  1. apex/
  2. apkdmverity/
  3. authfs/
  4. compos/
  5. demo/
  6. demo_native/
  7. docs/
  8. encryptedstore/
  9. javalib/
  10. launcher/
  11. libs/
  12. microdroid/
  13. microdroid_manager/
  14. pvmfw/
  15. rialto/
  16. service_vm/
  17. tests/
  18. virtualizationmanager/
  19. virtualizationservice/
  20. vm/
  21. vm_payload/
  22. vmbase/
  23. vmclient/
  24. zipfuse/
  25. .clang-format
  26. .gitignore
  27. Android.bp
  28. OWNERS
  29. PREUPLOAD.cfg
  30. README.md
  31. rustfmt.toml
  32. TEST_MAPPING
README.md

Android Virtualization Framework (AVF)

Android Virtualization Framework (AVF) provides secure and private execution environments for executing code. AVF is ideal for security-oriented use cases that require stronger isolation assurances over those offered by Android’s app sandbox.

Visit our public doc site to learn more about what AVF is, what it is for, and how it is structured. This repository contains source code for userspace components of AVF.

If you want a quick start, see the getting started guideline and follow the steps there.

For in-depth explanations about individual topics and components, visit the following links.

AVF components:

AVF APIs:

How-Tos: